neonprimetime Profile
neonprimetime

@neonprimetime

Followers
3K
Following
12K
Media
2K
Statuses
10K

detection engineering, malware analysis, IR, threat hunting #DailyThreatHunt, threat intel, blue team, Qradar, Author of now archived @PhishKitTracker project

United States
Joined June 2009
Don't wanna be here? Send us removal request.
@neonprimetime
neonprimetime
2 years
3 months of threat hunt ideas , hopefully enough to get a new team started , or to give an existing team a few new ideas. Go #blueteam ! #DailyThreatHunt #threathunt
@neonprimetime
neonprimetime
2 years
Day #1: Today starts the #DailyThreatHunt challenge! Post your unique #threathunt ideas to the world. Help the #blueteam fight the good fight by helping those orgs that don’t know where to start. Make threat hunting the new norm. https://t.co/Tmi17wQO86 Hunt 🧐 Ideas below 👇
0
0
1
@downdetector
Downdetector
10 days
User reports indicate problems with GitHub since 9:22 AM EST. How is it affecting you? #GithubDown https://t.co/AnHuuJOsNy
0
4
19
@striver_79
Striver | Building takeUforward
2 months
AWS Outage (US-EAST-1): Explained Simply 1️⃣ Started with a DNS issue - AWS services couldn’t talk to each other. 2️⃣ This broke DynamoDB, which many other services depend on. 3️⃣ EC2 launches & Lambda jobs started failing due to the chain effect. 4️⃣ AWS fixed the DNS issue, but
138
1K
9K
@neonprimetime
neonprimetime
2 months
“…PayPal’s crypto partner mints a whopping $300 trillion worth of stablecoins in ‘technical error’… double the world’s estimated total GDP … fixed after about 20 minutes …” 🔥🔥🔥 #paypal #bitcoin #stablecoin https://t.co/GLB3AWdReE
Tweet card summary image
cnbc.com
Paxos, the blockchain partner of PayPal, mistakenly minted $300 trillion of the online payment giant's stablecoin on Wednesday in what the company called a "technical error." 
0
0
0
@AustinLarsen_
Austin Larsen
3 months
Our team at @Mandiant just published urgent research on an espionage campaign by China-nexus actors using the BRICKSTORM backdoor. They’ve been in victim networks undetected for over a year, targeting tech & legal sectors for IP theft and intel on US trade and national security.
2
31
103
@neonprimetime
neonprimetime
4 months
"...primary objective has shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics..." #ransomware #cloud #azure
@MsftSecIntel
Microsoft Threat Intelligence
4 months
The financially motivated threat actor Storm-0501 has continuously evolved to achieve sharpened focus on cloud-based TTPs as their primary objective shifted from deploying on-premises endpoint ransomware to using cloud-based ransomware tactics.
0
0
0
@watchtowrcyber
watchTowr
4 months
Well, well well, it must be another day ending in 'day'. Citrix Netscaler vulnerabilities (CVE-2025-7775 and friends) are being actively exploited and backdoored - patching is not enough. Need help determining your exposure? Reach out via our website https://t.co/gzSQETs11l
4
16
76
@neonprimetime
neonprimetime
7 months
“… Recovery was hampered by the need to manually restore some AWS Transit Gateway routes…” #sentinelone outage RCA
0
0
0
@neonprimetime
neonprimetime
7 months
“… critical network routes and DNS resolver rules, necessary for connecting infrastructure, were deleted as a result of a software flaw in an automated process…” #sentinelone outage RCA
1
0
0
@neonprimetime
neonprimetime
7 months
Official RCA (root cause) for Sentinel One outage “…software flaw in an infrastructure control system that removed critical network routes, causing widespread loss of network connectivity within the SentinelOne platform…” https://t.co/iPuKfcoqJM #sentinelone
Tweet card summary image
sentinelone.com
Read SentinelOne's updates and official Root Cause Analysis (RCA) on the May 29, 2025 outage in this blog post.
1
0
5
@KrisHetzel
Kristopher Hetzel
7 months
1
1
3
@agent_duckman
AD 🅅
7 months
Yikes @SentinelOne is hard down
3
2
11
@ido_cohen2
DarkFeed
9 months
🚨 Ransomware Alert: Medusa Hits NASCAR The ransomware group Medusa has listed the National Association for Stock Car Auto Racing (NASCAR) as a victim on its leak site. 📂 The threat actors claim to have exfiltrated 1,038.70 GB of sensitive data and are demanding $4 million to
0
31
22
@techspence
spencer
9 months
There's no reason to NOT strictly control RMM installation and usage in your environment. There are currently 272 RMMs in the LoLRMM project right now. Most orgs probably use 1 or 2, legitimately. https://t.co/NdQtIpYbIK
6
29
186
@HeyZoyaKhan
ZOYA ✪
9 months
Microsoft is Offering FREE Azure 2025 Certification Courses! No Fee, Completely Free These 20 Courses Includes Video Tutorials, Hand's on Labs and Notes. Don't miss these courses if you want to make your career in 2025:
24
308
2K
@HuntressLabs
Huntress
9 months
A threat actor slid into a network through exposed virtual network computing (VNC). Here’s what happened 👇 ✅ They deployed C:\\Users\\<redacted>\\Music\\setup.msi to install Atera & Splashtop for persistent remote access
1
11
91
@neonprimetime
neonprimetime
10 months
“…threat actors dropped… ransomware payload …but the victim's EDR … quarantined it … threat actors utilized the webcam's Linux operating system to mount Windows SMB network shares … used it to encrypt the network shares over SMB, effectively circumventing the EDR …” #akira
@BleepinComputer
BleepingComputer
10 months
Akira ransomware encrypted network from a webcam to bypass EDR - @billtoulas https://t.co/Yb4hIq4N2y https://t.co/Yb4hIq4N2y
0
0
2